Which view is NOT a valid CPVIEW view?
Which view is NOT a valid CPVIEW view?A . IDAB . RADC . PDPD . VPNView AnswerAnswer: C
Fill in the blank: The tool ________ generates a R80 Security Gateway configuration report.
Fill in the blank: The tool ________ generates a R80 Security Gateway configuration report.A . infoCPB . infoviewC . cpinfoD . fw cpinfoView AnswerAnswer: C
The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?
The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?A . Secure Internal Communication (SIC)B . Restart Daemons if they failC . Transfers messages between Firewall processesD . Pulls application monitoring statusView AnswerAnswer: D Explanation: Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk97638
Which command is used to set the CCP protocol to Multicast?
Which command is used to set the CCP protocol to Multicast?A . cphaprob set_ccp multicastB . cphaconf set_ccp multicastC . cphaconf set_ccp no_broadcastD . cphaprob set_ccp no_broadcastView AnswerAnswer: B Explanation: Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk20576
CPM process stores objects, policies, users, administrators, licenses and management data in a database.
CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is:A . MySQLB . Postgres SQLC . MarisDBD . SOLRView AnswerAnswer: B Explanation: Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_MultiDomainSecurity/html_frameset.htm?topic=documents/R80/CP_R80_MultiDomainSecurity/15420
In R80 spoofing is defined as a method of:
In R80 spoofing is defined as a method of:A . Disguising an illegal IP address behind an authorized IP address through Port Address Translation.B . Hiding your firewall from unauthorized users.C . Detecting people using false or wrong authentication loginsD . Making packets appear as if they come from an...
What happen when IPS profile is set in Detect Only Mode for troubleshooting?
What happen when IPS profile is set in Detect Only Mode for troubleshooting?A . It will generate Geo-Protection trafficB . Automatically uploads debugging logs to Check Point Support CenterC . It will not block malicious trafficD . Bypass licenses requirement for Geo-Protection controlView AnswerAnswer: C Explanation: It is recommended to...
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?
The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?A . fwd via cpmB . fwm via fwdC . cpm via cpdD . fwd via cpdView AnswerAnswer: A
If you needed the Multicast MAC address of a cluster, what command would you run?
If you needed the Multicast MAC address of a cluster, what command would you run?A . cphaprob Ca ifB . cphaconf ccp multicastC . cphaconf debug dataD . cphaprob igmpView AnswerAnswer: D
Which command will allow you to see the interface status?
Which command will allow you to see the interface status?A . cphaprob interfaceB . cphaprob CI interfaceC . cphaprob Ca ifD . cphaprob statView AnswerAnswer: C Explanation: Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7298.htm